Alert GCSA-16011 - Bollettino di Sicurezza Microsoft Febbraio 2016
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-16011
Data: 10 Febbraio 2016
Titolo: Bollettino di Sicurezza Microsoft Febbraio 2016
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato 13 bollettini di sicurezza relativi
a vulnerabilita' presenti nei sistemi operativi Windows
ed in altre applicazioni:
MS16-009 Cumulative Security Update for Internet Explorer (3134220)
MS16-011 Cumulative Security Update for Microsoft Edge (3134225)
MS16-012 Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938)
MS16-013 Security Update for Windows Journal to Address Remote Code Execution (3134811)
MS16-014 Security Update for Microsoft Windows to Address Remote Code Execution (3134228)
MS16-015 Security Update for Microsoft Office to Address Remote Code Execution (3134226)
MS16-016 Security Update for WebDAV to Address Elevation of Privilege (3136041)
MS16-017 Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700)
MS16-018 Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3136082)
MS16-019 Security Update for .NET Framework to Address Denial of Service (3137893)
MS16-020 Security Update for Active Directory Federation Services to Address Denial of Service (3134222)
MS16-021 Security Update for NPS RADIUS Server to Address Denial of Service (3133043)
MS16-022 Security Update for Adobe Flash Player (3135782)
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato
Internet Explorer
Microsoft Windows
Microsoft Edge
Microsoft Office
Microsoft SharePoint Server
Microsoft Office Web Apps
Microsoft SharePoint Foundation 2013
:: Impatto
Esecuzione remota di codice arbitrario
Acquisizione di privilegi piu' elevati
Denial of service
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza, febbraio 2016
https://technet.microsoft.com/library/security/ms16-feb
Bollettini Microsoft sulla sicurezza
https://technet.microsoft.com/library/security/MS16-009
https://technet.microsoft.com/library/security/MS16-011
https://technet.microsoft.com/library/security/MS16-012
https://technet.microsoft.com/library/security/MS16-013
https://technet.microsoft.com/library/security/MS16-014
https://technet.microsoft.com/library/security/MS16-015
https://technet.microsoft.com/library/security/MS16-016
https://technet.microsoft.com/library/security/MS16-017
https://technet.microsoft.com/library/security/MS16-018
https://technet.microsoft.com/library/security/MS16-019
https://technet.microsoft.com/library/security/MS16-020
https://technet.microsoft.com/library/security/MS16-021
https://technet.microsoft.com/library/security/MS16-022
Microsoft Update
http://windowsupdate.microsoft.com
https://www.update.microsoft.com/
http://support.microsoft.com/kb/294871
SANS ISC Diary
https://isc.sans.edu/forums/diary/Microsoft+February+2016+Patch+Tuesday/20711/
I riferimenti CVE sono disponibili
nelle segnalazioni originali.
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAla7Q6UACgkQwZxMk2USYELrpQCg21VPaHMJdfS/vUQQWCAWEakD
qXMAoK4NJBPZ0l3EWdd+rpMJeBtjXGaP
=nCGL
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-16011
Data: 10 Febbraio 2016
Titolo: Bollettino di Sicurezza Microsoft Febbraio 2016
******************************************************************
:: Descrizione del problema
Microsoft ha rilasciato 13 bollettini di sicurezza relativi
a vulnerabilita' presenti nei sistemi operativi Windows
ed in altre applicazioni:
MS16-009 Cumulative Security Update for Internet Explorer (3134220)
MS16-011 Cumulative Security Update for Microsoft Edge (3134225)
MS16-012 Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938)
MS16-013 Security Update for Windows Journal to Address Remote Code Execution (3134811)
MS16-014 Security Update for Microsoft Windows to Address Remote Code Execution (3134228)
MS16-015 Security Update for Microsoft Office to Address Remote Code Execution (3134226)
MS16-016 Security Update for WebDAV to Address Elevation of Privilege (3136041)
MS16-017 Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700)
MS16-018 Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3136082)
MS16-019 Security Update for .NET Framework to Address Denial of Service (3137893)
MS16-020 Security Update for Active Directory Federation Services to Address Denial of Service (3134222)
MS16-021 Security Update for NPS RADIUS Server to Address Denial of Service (3133043)
MS16-022 Security Update for Adobe Flash Player (3135782)
Maggiori dettagli sono disponibili nella segnalazioni ufficiali
alla sezione "Riferimenti".
:: Software interessato
Internet Explorer
Microsoft Windows
Microsoft Edge
Microsoft Office
Microsoft SharePoint Server
Microsoft Office Web Apps
Microsoft SharePoint Foundation 2013
:: Impatto
Esecuzione remota di codice arbitrario
Acquisizione di privilegi piu' elevati
Denial of service
:: Soluzioni
Installare manualmente le patch indicate nei bollettini Microsoft,
oppure utilizzare uno degli strumenti di aggiornamento come:
Aggiornamenti Automatici, Windows Update, Microsoft Update,
Windows Server Update Services, Systems Management Server.
:: Riferimenti
Riepilogo dei bollettini Microsoft sulla sicurezza, febbraio 2016
https://technet.microsoft.com/library/security/ms16-feb
Bollettini Microsoft sulla sicurezza
https://technet.microsoft.com/library/security/MS16-009
https://technet.microsoft.com/library/security/MS16-011
https://technet.microsoft.com/library/security/MS16-012
https://technet.microsoft.com/library/security/MS16-013
https://technet.microsoft.com/library/security/MS16-014
https://technet.microsoft.com/library/security/MS16-015
https://technet.microsoft.com/library/security/MS16-016
https://technet.microsoft.com/library/security/MS16-017
https://technet.microsoft.com/library/security/MS16-018
https://technet.microsoft.com/library/security/MS16-019
https://technet.microsoft.com/library/security/MS16-020
https://technet.microsoft.com/library/security/MS16-021
https://technet.microsoft.com/library/security/MS16-022
Microsoft Update
http://windowsupdate.microsoft.com
https://www.update.microsoft.com/
http://support.microsoft.com/kb/294871
SANS ISC Diary
https://isc.sans.edu/forums/diary/Microsoft+February+2016+Patch+Tuesday/20711/
I riferimenti CVE sono disponibili
nelle segnalazioni originali.
GARR CERT Newsletter subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAla7Q6UACgkQwZxMk2USYELrpQCg21VPaHMJdfS/vUQQWCAWEakD
qXMAoK4NJBPZ0l3EWdd+rpMJeBtjXGaP
=nCGL
-----END PGP SIGNATURE-----